{"version":"1.0","provider_name":"Le\u00f3n Inform\u00e1tica","provider_url":"https:\/\/leoninformatica.com.py\/inicio","author_name":"admin","author_url":"https:\/\/leoninformatica.com.py\/inicio\/index.php\/author\/admin_leon\/","title":"Nuestras soluciones - Le\u00f3n Inform\u00e1tica","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"4BOSqTpTDh\"><a href=\"https:\/\/leoninformatica.com.py\/inicio\/index.php\/nuestras-soluciones\/\">Nuestras soluciones<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/leoninformatica.com.py\/inicio\/index.php\/nuestras-soluciones\/embed\/#?secret=4BOSqTpTDh\" width=\"600\" height=\"338\" title=\"\u00abNuestras soluciones\u00bb \u2014 Le\u00f3n Inform\u00e1tica\" data-secret=\"4BOSqTpTDh\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/leoninformatica.com.py\/inicio\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/leoninformatica.com.py\/inicio\/wp-content\/uploads\/2024\/07\/dep-it.jpg","thumbnail_width":595,"thumbnail_height":346,"description":"Monitoreo de redes El monitoreo de red es una pr\u00e1ctica esencial en la gesti\u00f3n de infraestructuras de tecnolog\u00eda de la informaci\u00f3n, proporciona la informaci\u00f3n que los administradores de redes necesitan para determinar si una red est\u00e1 funcionando de manera eficiente y confiable, buscando componentes lentos o defectuosos. Esto se logra a trav\u00e9s de herramientas y [&hellip;]"}